Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

Security Enhancement Algorithm for Data Transmission using Elliptic Curve Diffie - Hellman Key Exchange

Shaikh Ammarah P. , Vikas Kaul, S K Narayankhedkar Published in Data Mining

IJAIS Proceedings on International Conference and workshop on Advanced Computing 2014
Year of Publication: 2014
© 2014 by IJAIS Journal
Download full text
  1. Shaikh Ammarah P., Vikas Kaul and S K Narayankhedkar. Article: Security Enhancement Algorithm for Data Transmission using Elliptic Curve Diffie - Hellman Key Exchange. IJAIS Proceedings on International Conference and workshop on Advanced Computing 2014 ICWAC 2014(2):10-16, June 2014. BibTeX

    @article{key:article,
    	author = "Shaikh Ammarah P. and Vikas Kaul and S K Narayankhedkar",
    	title = "Article: Security Enhancement Algorithm for Data Transmission using Elliptic Curve Diffie - Hellman Key Exchange",
    	journal = "IJAIS Proceedings on International Conference and workshop on Advanced Computing 2014",
    	year = 2014,
    	volume = "ICWAC 2014",
    	number = 2,
    	pages = "10-16",
    	month = "June",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

Data Security for end-end transmission is achieved by many different symmetric and asymmetric techniques for message confidentiality, message authentication and key exchange using transport layer security. This paper presents the combination of two symmetric algorithms AES and Blowfish to enhance security. AES is enhanced by modifying the S-boxes columns, and then combination of enhanced AES and blowfish is used for data confidentiality. Message digest 5 is used for authentication. Key exchange is done using ECDHA, Elliptic Curve Diffe Hellman algorithm. ECDSA is used for digital signature. Performance of this system is evaluated for text file, image file, audio file and video file on the basis of encryption/decryption processing time and throughput.

Reference

  1. "Network Security", Cisco system, ISOC NTW, 2000.
  2. Ayushi, 2010 "A Symmetric Key Cryptographic Algorithm", International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 15.
  3. Thorsteinson, 2003. "Asymmetric Cryptography", book Page 99 July 29.
  4. Bruce Schneier, 2008 "The Blowfish Encryption Algorithm".
  5. T. Nie, C. Song, X. Zhi 2010 "Performance Evaluation of DES and Blowfish Algorithms", Biomedical Engineering and computer Science International Conference, IEEE.
  6. N. Koblitz. , 1987 "Elliptic curve cryptosystems", Mathematics of Computation", 48, pages 203–209.
  7. M. J. B. Robshaw, Y. Lisa Yin, 1997. "Elliptic Curve Cryptosystems", an RSA Laboratories Technical.
  8. Nadeem, A. , Javed, M. Y. , 2005 "A Performance Comparison of Data Encryption Algorithms," IEEE, Information and Communication Technologies, ICICT, First International Conference, pp. 84- 89.
  9. K. Rege, N. Goenka, P. Bhutada, S. Mane, 2014, "Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA", International Journal of Computer applications (0975–8887) Volume 71– No. 2.
  10. D. S. Abdul, Elminaam, H. M. Abdul Kader and M. M. Hadhoud, 2009 "Performance Evaluation of Symmetric Encryption Algorithms" Communications of the IBIMA Volume 8, ISSN: 1943-7765.
  11. A. C. Pamarthy, K. Rajasekha. 2012. " A Hybrid Encryption Algorithm Based on Triple DES and RSA", International Conference on Information Technology, Electronics and Communications (ICITEC).
  12. A. Menezes, P. van Oorschot, S. Vanstone, 1996, "Key Management Techniques," CRC Press.
  13. Malan, David J. , M. Welsh, M. D. Smith, 2004 "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography". IEEE SECON 2004: 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks: SantaClara, California, 71-80. Piscataway, N. J. IEEE, 4-7.
  14. K. Rege, N. Goenka, P. Bhutada, S. Mane, 2014 "Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA", International Journal of Computer Applications (0975 – 8887), Volume 71– No. 22.
  15. R. Ahirwal, M. Ahke 2014 "Elliptic Curve Diffie-Hellman Key Exchange Algorithm for Securing Hypertext Information on Wide Area Network", (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 (2), 363 - 368.
  16. A. Chandrasekar, V. R. Rajasekar, V. Vasudevan, "Improved Authentication and Key Agreement Protocol Using Elliptic Curve Cryptography", International Journal of Computer Science and Security (IJCSS), Volume (3), Issue (4).
  17. H. Brar, 2010 "Performance analysis of Point multiplication methods for Elliptic curve".
  18. N. Jansma, B. Arrendondo 2004 "Performance comparison of elliptic curve and RSA digital signatures".
  19. G. M. Bertoni, F. Roberto, L. Breveglieri, F. Regazzoni, 2006 "Speeding Up AES By Extending a 32 bit Processor Instruction Set", Application-specific Systems, Architectures and Processors, IEEE.
  20. Abdel-Karim, Al Tamimi 2006, "Performance Analysis of Data Encryption Algorithms ".
  21. Yu-Jung Huang, Yang-Shih Lin, Kuang-Yu Hung, Kuo-Chen Lin 2006 "Efficient Implementation of AES IP", IEEE.
  22. Subashri T, Arunachalam R, Gokul Vinoth Kumar B, Vaidehi V 2010, "Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory", International journal of VLSI design & Communication Systems (VLSICS) Vol. 1, No. 4.
  23. T. Akishita, T. Takagi 2003 "Zero-Value Point Attacks on Elliptic Curve Cryptosystem".
  24. Izu, T. Takagi, 2003 "Exceptional Procedure Attack on Elliptic Curve Cryptosystems".
  25. I. Verbauwhede, B. Rouzeyre, M. Flottes, G. Di Natale, A. Das and J. Rolt, 2005 "A scan-based attack on Elliptic Curve Cryptosystems in presence of industrial Design-for-Testability structures".
  26. Seyit A. 2007 "Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks", IEEE.
  27. X. Li, J. Chen, D. Qin, W. Wan, 2010, "Research and Realization based on hybrid encryption algorithm of improved AES and ECC", IEEE.
  28. D. Salama Abdul Minaam, H. M. Abdual-Kader2, M. Mohamed Hadhoud 2010, "Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types", International Journal of Network Security, Vol. 11, No. 2, PP. 78-87.
  29. D. Bouslimi, G. Coatrieux, 2012, "A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images", IEEE.

Keywords

Symmetric encryption, AES, Blowfish, enhanced AES, Elliptic Curve Cryptography, ECDH, MD5 and ECDSA.